attacking the baseband modem of mobile -...

Post on 26-Apr-2018

217 Views

Category:

Documents

4 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Attacking the Baseband Modem of Mobile Phones to Breach the Users’ Privacy and Network Security

Dr. Christos Xenakis Dr. Christoforos Ntantogian Associate Professor, Department of Digital Systems School of Information and Communication Technologies, University of Piraeus, Greece.

• The status with mobile devices

• Mobile malware

• Motivation for this work

• The proposed malware: (U)SimMonitor

• Functionality

• Architecture

• Prerequisites

• Detection

• Impact – criticality

• White hat usage

Outline of the Presentation

• Nowadays, cyber attacks are shifting to mobile devices

1. Always on and connected 2. Valuable and critical data 3. Processing and storage resources equivalent to PC 4. High penetration

Mobile devices under attack

• GSM • 3G

• LTE

• Wifi

• Bluetooth

• NFC

Connection-enabled mobile devices

• Emails & documents (pdf, doc, etc.)

• Photos & videos

• Geolocation information

• Contacts and other lists

• SMS messages

• Critical applications (i.e., m-banking, m-wallet, m-VISA, VPN, cloud storage & services, password managers, etc.)

• Phone information (IMEI, IMSI, phone number)

Valuable data on mobile devices

• High speed CPU Powerful computing

Processing & storage equivalent to PC

High Penetration of mobile devices

Emergence and Increase of mobile malware • The increase of mobile malware exceeded this of PC malware

Statistics of mobile malware

Mobile malware evolution

Bluetooth Worm

MMS Spreading

Money BotNet

Organized Crime

Ransomware Cyber war

What is next ?

• In general, we can observe that mobile malware target and exploit

• the characteristics of the mobile OS

• to perform a variety of malicious actions

• To the best of our knowledge, there is no mobile malware that targets the baseband modem of mobile phones to breach:

• the privacy of mobile users

• the security of cellular networks

Motivation of this work

Smartphone contain at least two CPUs:

1. The application processor that runs the applications

2. The baseband processor that handles connectivity to the cellular network.

What is the Baseband modem?

• We have designed and implemented a new type of mobile malware for both Android and iPhone devices, which attacks the baseband modems

• It is capable of stealing security credentials and sensitive information of the cellular technology

• permanent and temporary identities, encryption keys, location of users, etc.

Github:

https://github.com/SSL-Unipi/U-SIMonitor

(U)SimMonitor

• It reads via AT commands security related and sensitive data from USIM/SIM card

• Encryptions keys used in the mobile network (Kc, KcGPRS, CK, IC)

• Key thresholds, ciphering indicator

• Identities, TMSI, P-TMSI, IMSI

• Network type, network provider

• Location area identity, Routing area identity (LAI, RAI)

• Cell ID

• The extracted data is uploaded to a server, deployed from the attacker

(U)SimMonitor functionality

• AT commands lie at the core of (U)SimMonitor

• A command language for modems designed in 1981

• Android and iOS communicate with the baseband processors through AT commands

1. Call control: commands for initiating and controlling calls.

2. Data call control: commands for controlling the data transfer and the Quality of Service.

3. Network services control: commands for supplementary services, operator selection, locking and registration.

4. SMS control: commands for sending, notifying of received SMS messages.

5. Data retrieval: commands to obtain information for the subscriber and the phone, such the IMSI, the IMEI, radio signal strength, batter status. etc.

(U)SimMonitor functionality

• (U)SimMonitor uses the following AT Commands:

1. CSRM to extract identities, keys and other data from SIM and USIM cards

2. COPS to extract the name of the operator

3. CREG to extract the Location Area Code (LAC) and the Cell ID

• The following command instructs the baseband processor to read and return data from a specific location of the SIM/USIM card, where the IMSI value is stored

(U)SimMonitor functionality

AT+CRSM=176,28423,0,0,3

• Radio Interface Layer (RIL) provides interface to the modem and hardware's radio on mobile phones

• RIL translates all telephony requests from the Android telephony and map them to the corresponding AT commands to the modem, and back again.

(U)SimMonitor functionality

(U)SimMonitor Architecture

• (U)SimMonitor requires root privileges in order to execute AT commands

• (U)SimMonitor delivers a payload

• Exploits discovered vulnerabilities to automatically obtain root permissions

• Provides privilege escalation

• Many devices are already rooted

(U)SimMonitor Prerequisite

• It runs in the background, while the user can normally operate his/her phone

• It uses the least possible resources of the modem

• It avoids blocking accidently a voice/data communication

• It has been designed to collect data transparently, without disrupting the proper operation of the phone

(U)SimMonitor Properties

• We tested five popular mobile antivirus (AV) products whether they are capable of recognizing it as a virus

• None of the tested AVs raised an alarm

• We believe that AV products should include the syntax of AT commands as signatures for their virus databases

(U)SimMonitor detection

• Using IMSI and TMSI identities an attacker can identify the victim user

• Using the location/routing area and Cell-ID parameters an attacker can approximately track victim’s movements

• Using the obtained encryption keys (i.e., Kc, KcGPRS, CK, IK) an attacker may disclose phone calls and data session, regardless of the strength of the employed cryptographic algorithm

• Eliminates the need of breaking the security of the employed cryptographic algorithms the encryption keys are in the possession of the attacker

• Comprises a threat for all mobile network technologies, even for the security enhanced LTE networks it renders inadequate all possible security measures that can be taken from the mobile operator

(U)SimMonitor Impact and Criticality

• (U)SimMonitor can be used to capture and analyze the security policy that a cellular operator enforces

• A functionality which is currently missing from Android and iPhone devices.

• Is Ciphering disabled?

• How often the encryption keys are refreshed ?

• How often the temporary identities are updated ?

• Paves the way for quantitative risk assessment

(U)SimMonitor white hat use

usim_monitor.mp4

(U)SimMonitor Video Demo

Thank you! Questions?

Prof. Christos Xenakis Systems Security Laboratory

Department of Digital Systems, School of Information and Communication Technologies University of Piraeus, Greece

http://ssl.ds.unipi.gr/ http://cgi.di.uoa.gr/~xenakis/

email: xenakis@unipi.gr

top related